• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
fbi identifies 16 conti ransomware attacks on us health care

FBI identifies 16 Conti ransomware attacks on US health care and first responder networks

You are here: Home / General Cyber Security News / FBI identifies 16 Conti ransomware attacks on US health care and first responder networks
May 24, 2021

The FBI’s Cyber Division qualified prospects the nation’s efforts to investigate and prosecute internet crimes. (FBI)

The FBI reported that the Conti team that a short while ago strike the Irish health and fitness method was liable for at least 16 ransomware attacks all through the past 12 months that specific U.S. health care and 1st responder networks, like law enforcement companies, crisis clinical solutions, 911 dispatch centers, and municipalities.

In accordance to the FBI, these health and fitness treatment and to start with responder networks are amongst the additional than 400 companies worldwide victimized by Conti – and about 290 are found in the U.S.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Like most ransomware variants, Conti commonly steals victims’ data files and encrypts the servers and workstations to drive a ransom payment from the victim. The ransom letter instructs victims to get hold of the actors through an on line portal to complete the transaction. If the ransom does not get paid, the stolen data is bought or posted to a public site controlled by the Conti actors. Ransom quantities change commonly and the FBI assesses are tailor-made to the victim. New ransom needs have been as significant as $25 million.

Ransomware groups like Conti actors will hold popping up and gain sophistication with every organization that pays, mentioned Joseph Neumann, cyber govt advisor at Coalfire. Neumann claimed hitting first responders and hospitals are great targets mainly because of the pressing require to get back into provider right after an attack. 

“Even if these corporations have a sound plan to get again to ordinary, it could possibly be slower than shelling out the ransomware,” Neumann claimed. “As viewed from the Colonial pipeline incident which is still impacting fuel selling prices and need, restoration of support is gradual even when the ransom receives paid out. Additionally, the enormous described payout will only give these attackers more fairness to carry on strengthening their infrastructure and bring in new and improved expertise.”

Oliver Tavakoli, CTO at Vectra, reported whilst each individual of the lively ransomware groups has its own certain collection of tools, quite a few of those tools are perfectly-recognised and pedestrian. Tavakoli stated the FBI report mentions Mimikatz, a tool produced in 2007. And components of Cobalt Strike had been also applied in the SolarWinds source chain hack.

“Stolen RDP credentials are leveraged by numerous ransomware groups, and encrypting knowledge to bring about operational mayhem and extorting ransoms by way of difficult-to-trace cryptocurrencies is the rather new phenomenon,” Tavakoli stated. “While there can be concerted governmental attempts to quickly disrupt sure ransomware groups, enterprises have to get a great deal far better at recognizing a spike of harmful alerts in their environments and quit the attacks in advance of exfiltration and encryption begins.”


Some parts of this post are sourced from:
www.scmagazine.com

Previous Post: «ey and crowdstrike partner to deliver cloud based security services EY and CrowdStrike partner to deliver cloud-based security services
Next Post: As market for cyber insurance booms, watchdog calls for better data as market for cyber insurance booms, watchdog calls for better»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.